1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
6

Which tool do you think would be the most useful if you were designing a logo for a business?

Computers and Technology
2 answers:
klio [65]3 years ago
7 0
Some kind of tablet, computer, or a device that can run a design program
Maurinko [17]3 years ago
6 0

Answer:

maybe a computer would be helpful

You might be interested in
A search engine is a way to
Nataly_w [17]
<span>The answer is letter C which is a Search Engine. It is a program that scans for and recognizes things in a database that relate to catchphrases or characters indicated by the client, utilized particularly to find specific destinations on the World Wide Web.</span>
7 0
3 years ago
Read 2 more answers
Class secretType { public: static int count; static int z; secretType(); secretType(int a); void print(); static void incrementY
ANEK [815]

Answer:

a. secretType mySecret(9)

Explanation:

6 0
3 years ago
Which of the following does not describe local alignment algorithm?
swat32

Answer:

The answer is "Option a".

Explanation:

A score can be detrimental. When an element has a score below zero, it means, that the sequences up to this point have no correlations, that are set to zero and its effects the previous alignment is excluded. Thus, alignment can be further found in every position later in the calculation. and other options are incorrect that can be described as follows:

  • In option b, In this option the score can be negative, that's why we can't set its value.
  • In option c, The first row and column must contain some value it can't be 0, that's why it is not correct.
  • In option d, It will start with a lower score and ends with a higher score, that's why it is not correct.

8 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
erastova [34]

If Seneca has not done anything since the conditional formatting she can undo what her last action was. This is done by either pressing control+Z or by clicking on the undo icon.

If other actions have been done, there are a few more steps that need to be taken in order to clear the formatting. They are:

1. Select the cell or cells whose formatting you want to delete.

2. Display the Home tab of the ribbon.

3. In the Editing group, click Clear | Clear Formats.

8 0
3 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • What is the answer to this question on the thing I'm doing in apex
    6·1 answer
  • What web page has html file that exists on web server?
    10·1 answer
  • In which folder would it be most appropriate to save your latest history report about World War I? History New Folder Science St
    15·1 answer
  • You will be given a grocery list, followed by a sequence of items that have already been purchased. You are going to determine w
    7·1 answer
  • Once you record your audio and click ok to save it what happens to the recording?
    9·1 answer
  • Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
    8·1 answer
  • What the defination of electronics capacitor
    11·1 answer
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
  • The internet is controlled by ______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!